10-22-2013 10:06 AM - edited 02-21-2020 07:15 PM
Hello,
I have configured AnyConnect to use a 10.0.7.0/24 subnet for it's DHCP pool. I can connect to the ASA just fine, but I cannot access any internal services on my 10.0.5.0/24 subnet which is my INSIDE interface vlan subnet. I have setup a NAT exemption rule:
access-list inside_nat0_outbound line 2 extended permit ip 10.0.5.0 255.255.255.0 object-group Any-Connect-Pool-10-0-7-0
AnyConnect is configured to bypass all ACL rules via the sysopt connection permit-vpn.
I am not sure if I'm supposed to create another route back to the VPN subnet or what exactly. When I ping from my VPN subnet to a client on the INSIDE subnet I can see the ICMP traffic flowing through the FW but I get no reply. I am not using split-tunnleing and I cannot connect to the internet either after establishing a VPN connection.
Thanks in advance for help.
Solved! Go to Solution.
10-22-2013 12:42 PM
Hi,
You will have to make sure that the following setting is enabled
same-security-traffic permit intra-interface
You will also have to make sure you have Dynamic PAT configured for your VPN Pool
If your current Dynamic PAT for internal users would be
global (outside) 1 interface
nat (inside) 1 10.0.5.0 255.255.255.0
Then you would need to add
nat (outside) 1 10.0.7.0 255.255.255.0
Hope this helps
Please do remember to mark a reply as the correct answer if it answered your question.
Feel free to ask more if needed
- Jouni
10-22-2013 10:13 AM
Hi,
Have you tried to ICMP multiple different hosts behind the "inside" interface? Have you tried to ICMP network devices behind "inside" interface? Have you confirmed that there is no software firewall causing problems on hosts?
Are you using the command "management-access inside" which should enable anyconnect hosts to ICMP to the "inside" interface IP address?
Is there a router behind the ASA which might cause problems with forwarding the return traffic?
Have you tried any TCP based connections from Client to internal hosts?
- Jouni
10-22-2013 10:18 AM
Jouni,
Thanks for the reply. I just tried to browse to an internal webserver and that worked. Why would ICMP packets not be returning back through the FW? I am pinging an internal fileserver.
Also, what do I need to do to allow http/https traffic through the VPN tunnel? I would prefer not to use a split tunnel.
10-22-2013 10:26 AM
Hi,
The default setting on an ASA firewall is that all traffic from behind a VPN connection is allowed to bypass interface ACL of the interface to which the VPN Connection is formed to.
You can check this setting by issuing
show run all sysopt
You should see
sysopt connection permit-vpn
If its set to its default. The format with "no" in front would mean that all traffic would need to be allowed in the interface ACL.
So if you are using Full Tunnel mode VPN Client at the moment and the above setting is at its default then ASA should not be blocking the connections and connections like http/https should work just fine.
Also the ICMP should not be blocked by the ASA. You can always check that you have ICMP Inspection enabled but I am not sure if it applies to this situation
policy-map global_policy
class inspection_default
inspect icmp
inspect icmp error
I would check for the possibility that the hosts/server are set to block ICMP but are allowed to send ICMP and receive reply to those.
- Jouni
10-22-2013 10:32 AM
OK - Thanks Jouni. I ran the show run all sysopt and got these results:
show run all sysopt
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
sysopt connection permit-vpn
sysopt connection reclassify-vpn
no sysopt connection preserve-vpn-flows
no sysopt nodnsalias inbound
no sysopt nodnsalias outbound
no sysopt radius ignore-secret
no sysopt noproxyarp inside
no sysopt noproxyarp outside
no sysopt noproxyarp dmz
As far as I can read it HTTP/HTTPS traffic should not be blocked. Is that correct?
10-22-2013 10:38 AM
Hi,
As far as I know all UDP/TCP/ICMP traffic should be allowed from the Client to the hosts/servers.
Naturally this is only considering what I have seen so far.
If you have been able to connect through the VPN to some internal Web server then it would seem to suggest the connectivity between VPN Client and internal network should be fine.
Naturally if something doesnt work it could be troubleshooted with the help of logging, packet-tracer and capturing packets on the ASA itself or on the hosts.
- Jouni
10-22-2013 12:37 PM
So I am still not able to access the internet from an AnyConnect VPN client with IP address 10.0.7.5 on the /24 subnet. I can access internal services. When I do the packet trace I get an access list error:
Interface: Outside
Source IP Address: 10.0.7.5
Destination IP Address: 74.125.228.39 (Google)
Source Port: Tried Multiple including 32000
Destination Port: http
Route Lookup: Check
Access-List: Action Drop - Rule on Outside interface Any/Any IP Deny
I tried adding an access rule on the outside interface to allow all 10.0.7.0/24 traffic access out and in.
Any thoughts?
10-22-2013 12:42 PM
Hi,
You will have to make sure that the following setting is enabled
same-security-traffic permit intra-interface
You will also have to make sure you have Dynamic PAT configured for your VPN Pool
If your current Dynamic PAT for internal users would be
global (outside) 1 interface
nat (inside) 1 10.0.5.0 255.255.255.0
Then you would need to add
nat (outside) 1 10.0.7.0 255.255.255.0
Hope this helps
Please do remember to mark a reply as the correct answer if it answered your question.
Feel free to ask more if needed
- Jouni
10-22-2013 12:50 PM
Jouni - Thanks for all of your help. Everything is working now
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide